Search Results for Hacking - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dHacking$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-23T07:39:54Z Quantum Computing, Cyber Security and Cryptography Issues, Technologies, Algorithms, Programming and Strategies ent://SD_ILS/0/SD_ILS:609403 2026-03-23T07:39:54Z 2026-03-23T07:39:54Z Author&#160;Goyal, S. B. editor.&#160;Kumar, Vidyapati. editor.&#160;Islam, Sardar M. N. editor. (orcid)0000-0001-9451-7390&#160;Ghai, Deepika. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4948-8">https://doi.org/10.1007/978-981-96-4948-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity and Identity Access Management ent://SD_ILS/0/SD_ILS:527374 2026-03-23T07:39:54Z 2026-03-23T07:39:54Z Author&#160;Rawal, Bharat S. author.&#160;Manogaran, Gunasekaran. author.&#160;Peter, Alexender. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2658-7">https://doi.org/10.1007/978-981-19-2658-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616229 2026-03-23T07:39:54Z 2026-03-23T07:39:54Z Author&#160;Chang, Victor. editor.&#160;Ramachandran, Muthu. editor.&#160;Walters, Robert J. editor.&#160;Wills, Gary. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>